SlideShare a Scribd company logo
1 of 29
Threat Hunting and
UEBA:
Similarities, Differences, and How
They Work Together
• Speakers:
• Greg Schaffer, FirstBank CISO
• Luis Maldonado. Sqrrl VP of Products
Sponsor:
© 2017 Security Current
Speakers
Greg Schaffer
First Bank CISO
Luis Maldonado
Sqrrl VP of Products
© 2017 Security Current
Peer-authored Research
Authored by Chief Information Security Officers, CISOs Investigate is an
ongoing series that offers first-hand insights to security leaders as they
make business-driven technology decisions.
About CISOs Investigate
© 2017 Security Current
CISO-authored Research
About CISOs Investigate
© 2017 Security Current
Unpacking theReport
© 2017 Security Current
"A risk-based approach is highly recommended in order
to gain some quick wins. Generally, this starts by
looking at privileged access to various applications."
- James Beeson, Chief Information Security Officer and IT Risk Leader,GE
Capital Americas
A CISO Looks at the History of UBA
© 2017 Security Current
• Incorporating user behavior beyond
simple login
• Behavioral analytics connects the
past (baseline), the present (event)
and future (pre-direction)
Technology Overview – Core Features
© 2017 Security Current
• Control Aspects
• Risk AssessmentTool
• Baseline
• Compliance
• Staffing
• Use Cases
• Challenges
Key Considerations
© 2017 Security Current
• Effective Across
Industries
• AWin-Win for CISOs
• A Natural Fit for Risk-
based Security
Takeaways
© 2017 Security Current
•Company Overview
•Business Use Cases
•Technology
•Business Goals
•Recommendations and Advice
Case Study – Oppenheimer & Co – Henry Jiang,CISO
Threat Hunting and
UEBA
© 2017 Sqrrl Data, Inc. All rights reserved. 12
Analytics Perspective
UBA
UEBA
Behavioral Analytics
© 2017 Sqrrl Data, Inc. All rights reserved. 13
HuntingTools
Visualization
Analytics
Data
Aggregation
Collaboration
© 2017 Sqrrl Data, Inc. All rights reserved. 14
Hunting
Proactive Iterative
Human-driven Analytical
© 2017 Sqrrl Data, Inc. All rights reserved. 15
Challenges Driving Hunting Investment
© 2017 Sqrrl Data, Inc. All rights reserved. 16
TheValue of Hunting
© 2017 Sqrrl Data, Inc. All rights reserved. 17
Threat Hunting Maturity Model
© 2017 Sqrrl Data, Inc. All rights reserved. 18
SOC Detection Processes (“Loops”)
Detection
Improvements
Observe
Alert
Validate
Hunting
Plan
Test
Content Development Automated Detection
Rules &
Analytics
Discover
Hypothesize
CompareImplementReviseInvestigateEnrich
© 2017 Sqrrl Data, Inc. All rights reserved. 19
Threat Hunting Loop
© 2017 Sqrrl Data, Inc. All rights reserved. 20
Analytics in the Hunting Loop
Analytics
help
provide a
starting
point for
hunts
© 2017 Sqrrl Data, Inc. All rights reserved. 21
Analytics in the Hunting Loop
Investigatio
n aided by
analytic
techniques
© 2017 Sqrrl Data, Inc. All rights reserved. 22
Analytics in the Hunting Loop
Identify
behavioral
patterns
© 2017 Sqrrl Data, Inc. All rights reserved. 23
Analytics in the Hunting Loop
Analytics
are
created
from the
results of
the hunt
© 2017 Sqrrl Data, Inc. All rights reserved. 24
Sqrrl’s Approach to Behavioral Analytics
Detection of kill chain-oriented
Tactics,Techniques, and Procedures of adversaries
rather than only general anomalies
© 2017 Sqrrl Data, Inc. All rights reserved. 25
Uniting UEBA and Hunting
© 2017 Sqrrl Data, Inc. All rights reserved. 26
SqrrlThreat Hunting Platform
© 2017 Sqrrl Data, Inc. All rights reserved. 27
info.sqrrl.com/download-uba-guide
User & Entity Behavior Analytics
What's included in this
Real-world insights from CISOs who already deployed tools
Case studies to highlight importance of UBA technology
A RFI template developed by the CISOs
CISO-authored UBA Buyer's Guide
© 2017 Sqrrl Data, Inc. All rights reserved. 28
info.sqrrl.com/download-ueba-ebook
User & Entity Behavior Analytics
What's included in this
What you need to know about advanced behavioral analytics
How it can automate and revolutionize threat hunting
How to use it for streamlined threat detection practices
The Heart of Next-Generation Threat Hunting
Q&A

More Related Content

What's hot

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 

What's hot (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Security Information and Event Managemen
Security Information and Event ManagemenSecurity Information and Event Managemen
Security Information and Event Managemen
 
Cyber Threat hunting workshop
Cyber Threat hunting workshopCyber Threat hunting workshop
Cyber Threat hunting workshop
 
Cyber Threat Hunting with Phirelight
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Threat hunting - Every day is hunting season
Threat hunting - Every day is hunting seasonThreat hunting - Every day is hunting season
Threat hunting - Every day is hunting season
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
Cyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metrics
 
Threat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptxThreat hunting foundations: People, process and technology.pptx
Threat hunting foundations: People, process and technology.pptx
 
Security Information and Event Management
Security Information and Event ManagementSecurity Information and Event Management
Security Information and Event Management
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Threat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill ChainThreat Hunting with Cyber Kill Chain
Threat Hunting with Cyber Kill Chain
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
PHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On LabPHDays 2018 Threat Hunting Hands-On Lab
PHDays 2018 Threat Hunting Hands-On Lab
 
Threat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep SinghThreat hunting 101 by Sandeep Singh
Threat hunting 101 by Sandeep Singh
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Similar to Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together

Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
DataWorks Summit
 

Similar to Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together (20)

Modernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led TrainingModernizing Your SOC: A CISO-led Training
Modernizing Your SOC: A CISO-led Training
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Analyst Resources for Chief Information Security Officers (CISOs)
Analyst Resources for Chief Information Security Officers (CISOs)Analyst Resources for Chief Information Security Officers (CISOs)
Analyst Resources for Chief Information Security Officers (CISOs)
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
How to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security AnalyticsHow to Operationalize Big Data Security Analytics
How to Operationalize Big Data Security Analytics
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Netwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech TalkNetwatcher Credit Union Tech Talk
Netwatcher Credit Union Tech Talk
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
Machine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-HuntingMachine Learning + AI for Accelerated Threat-Hunting
Machine Learning + AI for Accelerated Threat-Hunting
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics A New Approach to Threat Detection: Big Data Security Analytics
A New Approach to Threat Detection: Big Data Security Analytics
 
Emerging Trends in Application Security
Emerging Trends in Application Security Emerging Trends in Application Security
Emerging Trends in Application Security
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
Cyber-I3 System - Intelligence, Incidence, and Investigation-based Big Data T...
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
 

More from Sqrrl

More from Sqrrl (20)

Transitioning Government Technology
Transitioning Government TechnologyTransitioning Government Technology
Transitioning Government Technology
 
Leveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your HuntsLeveraging Threat Intelligence to Guide Your Hunts
Leveraging Threat Intelligence to Guide Your Hunts
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Machine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting StartedMachine Learning for Incident Detection: Getting Started
Machine Learning for Incident Detection: Getting Started
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)Threat Hunting Platforms (Collaboration with SANS Institute)
Threat Hunting Platforms (Collaboration with SANS Institute)
 
Threat Hunting for Command and Control Activity
Threat Hunting for Command and Control ActivityThreat Hunting for Command and Control Activity
Threat Hunting for Command and Control Activity
 
Leveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker ActivityLeveraging DNS to Surface Attacker Activity
Leveraging DNS to Surface Attacker Activity
 
The Art and Science of Alert Triage
The Art and Science of Alert TriageThe Art and Science of Alert Triage
The Art and Science of Alert Triage
 
Reducing Mean Time to Know
Reducing Mean Time to KnowReducing Mean Time to Know
Reducing Mean Time to Know
 
Sqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use CaseSqrrl Enterprise: Big Data Security Analytics Use Case
Sqrrl Enterprise: Big Data Security Analytics Use Case
 
The Linked Data Advantage
The Linked Data AdvantageThe Linked Data Advantage
The Linked Data Advantage
 
Sqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, AnalyzeSqrrl Enterprise: Integrate, Explore, Analyze
Sqrrl Enterprise: Integrate, Explore, Analyze
 
Sqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber HuntingSqrrl Datasheet: Cyber Hunting
Sqrrl Datasheet: Cyber Hunting
 
Benchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value StoreBenchmarking The Apache Accumulo Distributed Key–Value Store
Benchmarking The Apache Accumulo Distributed Key–Value Store
 
Scalable Graph Clustering with Pregel
Scalable Graph Clustering with PregelScalable Graph Clustering with Pregel
Scalable Graph Clustering with Pregel
 
What's Next for Google's BigTable
What's Next for Google's BigTableWhat's Next for Google's BigTable
What's Next for Google's BigTable
 
April 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with SqrrlApril 2015 Webinar: Cyber Hunting with Sqrrl
April 2015 Webinar: Cyber Hunting with Sqrrl
 
Sqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch WebinarSqrrl 2.0 Launch Webinar
Sqrrl 2.0 Launch Webinar
 
October 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat DetectionOctober 2014 Webinar: Cybersecurity Threat Detection
October 2014 Webinar: Cybersecurity Threat Detection
 

Recently uploaded

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Recently uploaded (20)

%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 

Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together

  • 1. Threat Hunting and UEBA: Similarities, Differences, and How They Work Together • Speakers: • Greg Schaffer, FirstBank CISO • Luis Maldonado. Sqrrl VP of Products Sponsor:
  • 2. © 2017 Security Current Speakers Greg Schaffer First Bank CISO Luis Maldonado Sqrrl VP of Products
  • 3. © 2017 Security Current Peer-authored Research Authored by Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions. About CISOs Investigate
  • 4. © 2017 Security Current CISO-authored Research About CISOs Investigate
  • 5. © 2017 Security Current Unpacking theReport
  • 6. © 2017 Security Current "A risk-based approach is highly recommended in order to gain some quick wins. Generally, this starts by looking at privileged access to various applications." - James Beeson, Chief Information Security Officer and IT Risk Leader,GE Capital Americas A CISO Looks at the History of UBA
  • 7. © 2017 Security Current • Incorporating user behavior beyond simple login • Behavioral analytics connects the past (baseline), the present (event) and future (pre-direction) Technology Overview – Core Features
  • 8. © 2017 Security Current • Control Aspects • Risk AssessmentTool • Baseline • Compliance • Staffing • Use Cases • Challenges Key Considerations
  • 9. © 2017 Security Current • Effective Across Industries • AWin-Win for CISOs • A Natural Fit for Risk- based Security Takeaways
  • 10. © 2017 Security Current •Company Overview •Business Use Cases •Technology •Business Goals •Recommendations and Advice Case Study – Oppenheimer & Co – Henry Jiang,CISO
  • 12. © 2017 Sqrrl Data, Inc. All rights reserved. 12 Analytics Perspective UBA UEBA Behavioral Analytics
  • 13. © 2017 Sqrrl Data, Inc. All rights reserved. 13 HuntingTools Visualization Analytics Data Aggregation Collaboration
  • 14. © 2017 Sqrrl Data, Inc. All rights reserved. 14 Hunting Proactive Iterative Human-driven Analytical
  • 15. © 2017 Sqrrl Data, Inc. All rights reserved. 15 Challenges Driving Hunting Investment
  • 16. © 2017 Sqrrl Data, Inc. All rights reserved. 16 TheValue of Hunting
  • 17. © 2017 Sqrrl Data, Inc. All rights reserved. 17 Threat Hunting Maturity Model
  • 18. © 2017 Sqrrl Data, Inc. All rights reserved. 18 SOC Detection Processes (“Loops”) Detection Improvements Observe Alert Validate Hunting Plan Test Content Development Automated Detection Rules & Analytics Discover Hypothesize CompareImplementReviseInvestigateEnrich
  • 19. © 2017 Sqrrl Data, Inc. All rights reserved. 19 Threat Hunting Loop
  • 20. © 2017 Sqrrl Data, Inc. All rights reserved. 20 Analytics in the Hunting Loop Analytics help provide a starting point for hunts
  • 21. © 2017 Sqrrl Data, Inc. All rights reserved. 21 Analytics in the Hunting Loop Investigatio n aided by analytic techniques
  • 22. © 2017 Sqrrl Data, Inc. All rights reserved. 22 Analytics in the Hunting Loop Identify behavioral patterns
  • 23. © 2017 Sqrrl Data, Inc. All rights reserved. 23 Analytics in the Hunting Loop Analytics are created from the results of the hunt
  • 24. © 2017 Sqrrl Data, Inc. All rights reserved. 24 Sqrrl’s Approach to Behavioral Analytics Detection of kill chain-oriented Tactics,Techniques, and Procedures of adversaries rather than only general anomalies
  • 25. © 2017 Sqrrl Data, Inc. All rights reserved. 25 Uniting UEBA and Hunting
  • 26. © 2017 Sqrrl Data, Inc. All rights reserved. 26 SqrrlThreat Hunting Platform
  • 27. © 2017 Sqrrl Data, Inc. All rights reserved. 27 info.sqrrl.com/download-uba-guide User & Entity Behavior Analytics What's included in this Real-world insights from CISOs who already deployed tools Case studies to highlight importance of UBA technology A RFI template developed by the CISOs CISO-authored UBA Buyer's Guide
  • 28. © 2017 Sqrrl Data, Inc. All rights reserved. 28 info.sqrrl.com/download-ueba-ebook User & Entity Behavior Analytics What's included in this What you need to know about advanced behavioral analytics How it can automate and revolutionize threat hunting How to use it for streamlined threat detection practices The Heart of Next-Generation Threat Hunting
  • 29. Q&A

Editor's Notes

  1. Primary UBA use cases 1) risk mgmt oriented: trusted insider threat, contractor 2) threat detection oriented: external attacker compromising a host/user and using their creds Use Cases: departure theft, anomalous VPN, call center privacy breach, priv account sharing… EUBA adds others Databases – focus on data protection and governance Applications – CASB misuse We believe you shouldn’t stop there, especially Security Ops teams External attacks that are already in the network Many times no longer simply using user accounts; now have persistence, command control, staging points etc. => need Behavioral analytics across protocols, file systems, host configurations etc. Network flow Ucs: Data exfil, lateral movement Registry DNS data Files system Use Cases: targeted attacks, advanced malware, What you see is Analytics are great tools but need to be built into your organization’s processes and use cases
  2. At Sqrrl, we focus on powering Threat Hunters, so analytics are a great tool Important to note, analytics tools don’t stand on their own. Security Analysts need additional hunting tools to enable their work including: Data aggregation Visualization capabilities Collaboration tools to share insights, assist in investigations, train on best practices etc
  3. Survey across 350,000 member Infosec community
  4. To be effective, hunting needs to be incorporated into other SOC processes (or “loops”) Most SOCs already have mature content development and detection loops Implement signatures, rules and other content that feeds their automated detection processes (IDS, SIEM, DLP etc) Detection cycle – observe, compare to signature, patterns, content; alert; human validates What hunting loop focuses on is coming up with new ideas of activity and behavior to look for This process is used to find things not already in your automated detection content More importantly, drives improvements to your content
  5. Take a closer look at the hunting loop:
  6. Identify behavioral patterns Using link analysis Looking for behavior chains Clusters of anomalous behavior
  7. DGA Locky ransomware Mirai botnet Vawtrak banking trojan
  8. Overview of the Sqrrl platform Ingest traditional and non traditional security sources Logs are common core data sets Supports structured and semi-structured file types Extensible framework for parsing customized sources BENFITS: Include non-traditional sources that provide context (e.g. HR reports, Email, App data) Dynamic extraction We do the ‘heavy lifting’ of populating your desired graph Contrast this with ‘case file’ oriented products such IBM i2 and Palantir Contrast with Maltego which only builds a graph view of queries (called Transforms) BENEFIT: analysts don’t have to focus on massaging data We store the model and the raw data which allows: Evolution of the model Multiple models on the same data – enables team sharing, data reuse etc. Analysis Provide multiple analysis techniques (search, exploration, reporting, computations) Common syntaxes and programming for power users (python, Lucene, SQL) visual exploration environment for patterns, exploring relationships, connections Computational techniques for finding and filtering anomalies / outliers; baseline and compare entity behavior across peer groups Extensible framework for integrating with Hadoop frameworks such as Spark BENEFITS: faster hunting through visual and search techniques; find behaviors and outliers that are hard to see